} else {
T( trace(T_KEYEXCH, "keyexch: sending reply to `%s'", p_name(kx->p)); )
buf_init(&bb, buf_i, sizeof(buf_i));
- G_TOBUF(gg, &bb, kxc->r);
+ G_TORAW(gg, &bb, kxc->r);
buf_flip(&bb);
ks_encrypt(kxc->ks, MSG_KEYEXCH | KX_REPLY, &bb, b);
}
}
buf_init(b, BBASE(&bb), BLEN(&bb));
r = G_CREATE(gg);
- if (G_FROMBUF(gg, b, r)) {
+ if (G_FROMRAW(gg, b, r)) {
a_warn("KX", "?PEER", kx->p, "invalid", "reply", A_END);
goto bad;
}